Step 1 – Digital Freedom



Welcome to 10 Steps to Escape
the Big Tech Digital Prison

currently being built around us

The Virtual Webmaster – 2023

Version 1.0 – September 2023

Walking Away from Big Tech in Baby Steps

Select your preferred video platform to watch
or select the Transcript Tab to read


Play time : 22.05

Watch on Odysee in new window

Click the Odysee icon to watch directly on Odysee.
(will open in a new window)

Play time : 22.05

Watch on Bitchute

Click the Bitchute icon to watch directly on Bitchute.
(will open in a new window)

Play time : 22.05


Click the Rumble icon to watch directly on Rumble.
(will open in a new window)

The Virtual Webmaster

G’day, I’m The Virtual Webmaster and have been an IT professional for more than 40 years, and have spent the past 20 years as a Webmaster, SEO specialist and online entrepreneur.

I was around long before the Big Tech takeover of Silicon Valley.

In fact, I was around long before the internet.

I even predate the release of the first “Personal Computer”.

When it comes to IT, I am ancient.

My first Microcomputer (1979) was an Exidy Sorcerer similar to this picture

My first Microcomputer, the term Personal Computer would not be created until 1981 with the release of the IBM PC.

This was one of the ways my brother helped me get into IT. We went havles in buying it and were meant to share it but looking back I think this was his way to help his High School Dropout younger brother into a career.

Now I want to tell you a bit about this computer

And there is a point to this, I am not just reminiscing or providing more evidence about how ancient I am.

This computer had a whopping 4K of memory and came with a monochrome screen. It had no sound and no internal storage. You could not save any work on the computer itself. This is what the cassette recorder was for, and yes this is the same cassette player used for music in the 70s.

How does that compare with the average phone today?

4k of RAM is four thousand bytes

4Mb of RAM is four million bytes

4Gb of RAM is four billion bytes

4Tb of RAM is four Trillion bytes

Technology is evolving exponentially – humanity is not.

Technology has come a long way since then but when it comes to awareness of digital privacy, most people have made very little progress.


The Internet of Things
The Internet of Things – EVERYTHING CONNECTED

When the internet was available, I was one of the early adopters and since then I have watched it evolve.

In the early days, it was like the Wild West with no regulation and little censorship.

It was an exciting place full of diverse opinions and new ideas and it enabled people from all around the world to discover and connect with other people they would otherwise never have met, and share information.

It promised to bring the world closer together.

But as the internet grew, its potential was recognised and soon attracted Big Money which evolved into Big Tech.

I have watched as Big Tech has crept into almost every aspect of our digital lives.

Instead of bringing the world closer together, Big Tech has made the internet a divisive place full of echo chambers, created by addictive algorithms designed to maximise engagement.

Increasingly there is one official narrative, and any other view is labeled misinformation AKA wrongthink.

The world is changing radically and technology is driving that change.


Alvin Toffler - Future Shock
A book trilogy that predicts the impact of disruptive new technologies on society.

In 1970, Futurologist Alvin Toffler predicted the impact of disruptive new technologies on society.

He described Future shock as “the shattering stress and disorientation that we induce in individuals by subjecting them to too much change in too short a time.

This is the guy who invented the term “Information Overload

He described a world where most people will become obsolete…

Toffler was consulted by many world leaders, they have known what was coming for years…

These emerging disruptive technologies have arrived!

How have our world governments prepared for FUTURE SHOCK?

Artificial Intelligence
Artificial Intelligence
5G Network
5G Network
Blockchain Technology
Blockchain Technology
Gene Therapy
Gene Therapy / Transhuman
Virtual / Augmented Reality
Virtual / Augmented Reality
Robotics / 3D Printing
Robotics / 3D Printing

These technologies are coming together to create the potential for a surveillance state that makes 1984 seem mild by comparison.

Understand that the Technology genie is out of the bottle.

We can try to ignore it, but it will not ignore us.

because there are some that think they have a right to monitor, and ultimately control every aspect of the lives of others.

Christopher Anthony Lunsford,
And they don’t think you know, but I know that you do

Those people will eventually want to control us, and as much as we may wish that we “could just wake up, And it not be true, But it is, Oh, it is

They are not going to leave us alone

We either control our technology, or it will be used to control us

While we have NO control over BigTech technology…

We do have control how we interact with it.

We can also choose alternatives for most of it, and be part of building our own Digital Freedom based technology.

AND for the times when we do need to interact with Big Tech we can limit what Big Tech can see of the rest of the rest of our digital life.

Effectively putting Big Tech into a virtual digital prison on your device.



by simply taking control of our digital lives

Most people don’t even know where to start. The problem is not a lack of privacy information and good alternatives, the problem is information overload.

There is actually too much information out there already and people have no way to filter the good from the bad and then determine what is suitable for their needs.

When it comes to privacy, following the wrong or incomplete advice can be more dangerous than doing nothing, especially if you are lulled into believing you are secure and private when you are not.

For most people, online privacy has been just way too hard!

security vs privacy
We will always lose while we play their game (on their platforms)

I knew I had to do something to help people become less dependent on Big Tech and more aware of digital privacy.

I considered making my own how-to type guides for online privacy and Big Tech alternatives, but I knew that at the end of the day, in most cases, I would be reinventing the wheel, and just adding to that information overload.

I understood the obstacles stopping most people but I knew that something even more important was missing.

People need a simple framework and methodology to follow, or to put it in simple English; A way to know how to navigate to the right information, find alternatives best suited to their needs, and then have a process to follow to safely implement them.

A Roadmap to Online Freedom

Original Training Program the 10-Step Plan is based on

I could not find anything like that so in late 2022 I started to create that framework and called it A Roadmap to Online Freedom.

I ran eight weeks of live training with a small group recording more than 20 hours of video on how to obtain online privacy and anonymity.

When I started the pilot training I had an outline of the training I wanted to provide but as I progressed I experienced a number of epiphanies.

  • No Privacy without Digital Freedom

One of the first was realising that the issue of digital privacy extended way beyond what we consider to be online. The Internet Of Things means that almost everything in our physical environment is being connected to create a surveillance state that has already surpassed 1984 in many ways.

what does digital freedom look like
We can’t have privacy without Digital Freedom

I created 10 Steps to Escape the Digital Prison because also realised that, WE CAN NEVER ACHIEVE PRIVACY WITHOUT FREEDOM. For these reasons, I have started talking about Digital Freedom instead of online privacy

  • A Different Perspective

I created A roadmap to Online Freedom because I could not find anything like it and I wondered…why me?

computer operator
The early 1980s -my brother got me my first IT job as a Tape Librarian, I was then trained as a Computer Operator, went to night school and a few years later got my first job as an Application Developer (COBOL maintenance and C)

I started to realise that my experience and skill set was unique and this gave me a different perspective on Digital Privacy

Here are some of the roles I have had spanning over 40 years in IT:

  • Computer Operator
  • Application Programmer
  • PC Help Desk Manager
  • Server Administrator
  • System Analyst
  • IT Project Manager
  • IT Contractor
  • National Help Desk Manager
  • Search Engine Optimisation (SEO)
  • Internet Consultant
  • Online Marketing
  • Webmaster

It was my experience as a Webmaster and as an SEO specialist that I kept referencing when creating the training.

My role was to analyse the Google algorithm and optimise websites so they would rank higher the in the organic search results.

This included attempting to manipulate the Big Tech algorithms using fake accounts and backlinks generated using an amazing array of specialised tools and services.

It was all about avoiding detection and staying under the radar.

I was also a big user of Google’s advertising services (Adwords & Adsense) and this gave me an insight into the amount of personal data Big Tech are collecting.

  • A paradigm shift is required

We need to change the way we think about privacy.

midnight express escape
You need to escape in your mind before you can physically escape…

This means taking control of your digital life
and developing a new level of privacy awareness

As with anything new, such as learning to drive a car, It can seem overwhelming at first, with so many new things to consider and coordinate. But over time with practice and experience, it becomes second nature. The same is true when reclaiming your privacy.

Just as you don’t need to be a mechanic to drive a car…
you don’t need to be a cybersecurity expert or
become a nerd to reclaim your digital privacy

  • The path to Digital Freedom is easier than I first thought


Elephant chained at its leg can walk away anytime.
How many of the controls and limitations that are imposed on us are like these chains?

…but are seldom attached to any structure that the adult Elephant could not simply walk away from with little effort… but it almost never does because as a baby it learnt that the chain did control it.

The digital prison being constructed is like those chains and most people will just accept the new controls and limitations imposed on them not even considering the possibility of simply walking away!

My last and most important realisation was that it’s a lot easier to achieve online privacy now. I discovered that there are more people than ever before working in the background to create the alternative platforms and tools we need for Digital Freedom.

There really is a great alternative for just about everything you could want and for the times when you need to use Big Tech, there is a way to put Big Tech into a virtual digital prison on your device.

10 Step Course Overview

Each step will take you through an area where you can isolate Big Tech from the rest of your digital life.

step 1 digital freedom eagle yel

Step 1 – Digital Freedom

Change how you think about privacy
Exposing some Big Tech myths
Thinking about what Digital Freedom

Step 2 Privacy Browser yel

Step 2 – Private Browsing

Introduction to compartmentalisation
Using browser isolation
Creating your own Browser strategy

Step 3 Private search yel

Step 3 – Private Search & Discovery

Alternative search
Using proxies for Big Tech Search
AI assisted search

Step 4 Private communication yel

Step 4 – Private Communication

Introduction to private communication using encryption including email and personal messaging.

Step 5 Private alternatives yel

Step 5 – Private Alternatives

How to find alternatives
How to evaluate alternatives
How to safely migrate to alternatives

Step 6 Private ecommerce yel

Step 6 – Private E-commerce

Safe online transactions
Private transactions
Exploring parallel economies

Step 7 Private social yel

Step 7 – Private Social

Alternative social platforms
Manage your Big Tech social
Better manage your information

Step 8 Backup and storage yel

Step 8 – Backup & Storage

How to locate all your data
How to secure your data
How to remove data online

Step 9 Private Crypto yel

Step 9 – Decentralised Networks

Decentralised networks are central to creating digital freedom enables us to create alternative internets that can’t be controlled by Big Tech or Big Brother

Step 10 Private internet yel

Step 10 – Private Internet

We explore Web 3.0 and the new alternative Internet currently being built for us.

Dedicated to my brother “Max” who gave me my start in IT


1937 – 2021

I would also like to acknowledge NettieBee who has put a huge amount of work into helping with the front-end web design and contributed many great ideas.

Navigating to Digital Freedom

How to navigate through the training and get the most from it.

Our 10-step course gives you access
to much more than just a training course.

We have included three tools to help you navigate to Digital Freedom.

Digit Freedom Launchpad


The Digital Launchpad is your home page for the 10 Step training course providing not only easy access to the training material but also to the alternative internet.

Search & Discovery

The Launchpad provides alternative uncensored search engines and proxy search for Big Tech search engines.

The Launchpad also provides alternate uncensored Video platforms and proxy access to YouTube.

10 Step to Escape Plan


From the Launchpad you can navigate through the 10 Steps from the Launchpad menu options.

The Current Step menu option will give you access to the parts of the currently selected step

Digit Freedom Tube


Your gateway to the alternate Internet

Digital Freedom Tube Channels:

  • Privacy Tools
  • Big Tech Alternatives
  • Online Resources
  • Freedom Videos
  • Privacy Communities

During this training, you will be learning how to make the best use of these tools, including learning how to use them to find and evaluate alternatives.

Resources are all in development.

escape the big tech digital prison

In this part, we will be looking at:

    part of a much larger corporate takeover of the world
    start where you are with what you have
    by taking control over our digital lives
    with freedom comes responsibility
    you can access this course anonymously


  • EXPLORE tab update

    The EXPLORE tab is for doing your own research. I have been updating all the EXPLORE tabs for each of the six parts and starting to add content to the DIGITAL FREEDOM TUBE.  Will advise when complete.

  • Welcome to the Course Updates

    Welcome to the course and the first course update. This is where you will be notified of any major changes or additions to the course.


Select your preferred platform

Play time : 12.48

Watch on Odysee in new window

Click the Odysee icon to watch directly on Odysee.
(will open in a new window)

Play time : 12.48

Watch on Bitchute

Click the Bitchute icon to watch directly on Bitchute.
(will open in a new window)

Play time : 12.48

Watch on Rumble

Click the Rumble icon to watch directly on Rumble.
(will open in a new window)



Escape the Big Tech Digital prison

Welcome to Step 1 of 10 Steps to Walk Away from Big Tech and escape the digital prison currently being built around us.

I am going to assume you know why you are here. I am not going to bombard you with fear porn about all the scary evil stuff Big Tech is up to.

Nor am I going to waste time speculating about how BAD this Big Tech Digital Prison may become, because…

However bad you think it might be, it will probably be a thousand times worse, IF we allow ourselves to be trapped inside it!

You are here to find out how to escape!

As stated on the Walk Away from Big Tech website this is about much more than online privacy and freedom of speech.

This is about a war for control of the internet, which is part of a much bigger corporate takeover of the entire world.

You are here because you are on the side that wants to keep the internet FREE.

The Bad News

But first the bad news: Nothing is going back to the way it was before. 

This is not a boycott. We do not want to reform Big Tech. Big Tech has nothing we need and everything they do can be easily replaced.

These people are not not fighting for your Digital Freedom!
These people are not not fighting for your Digital Freedom!
  • Existing Big Tech platforms cannot be reformed – we need to walk away from them.
  • No one is coming to save us, especially not politicians who will be co-wardens of the digital prison.
  • No magic software that is going to do this for you.

The Good News

We Can Win This!


So how do we win this war and gain digital freedom?

By taking responsibility for, and control over our digital lives.

The good news is much easier to do than most people believe.

I will introduce you to a powerful yet little known method to help you do this, including learning how to isolate Big Tech and Big Brother from the rest of your digital life.

This method also provides the absolute best defence against identity theft and many other cybersecurity threats.


It is something everyone can do regardless of their technical level, from Technophobe to Net Savvy. 


You start where you are with what you have

You don’t have to purchase any additional hardware or software. And you will soon discover that the alternatives really are better.

Warning & Disclaimer


But before we proceed I have this WARNING and disclaimer:

There is an old adage that a little knowledge can be a dangerous thing and this is especially true when it comes to digital privacy. As you acquire more knowledge on privacy there is a risk of believing you are private when you are not, and some may be tempted to engage in risky activity – I strongly advise against this.

I have created 10 Steps to help you achieve greater online safety and privacy. But ultimately this is about you being responsible for your digital life and the freedom to do what you feel is right.

This is educational content, you are always encouraged to Do Your Own Research and should not trust or base any action on information from a single source. DO NOT proceed unless you agree to take full responsibility for everything you do with regard to online security and privacy.

Course Fees


PWYW Pricing Model

Pay What You Want is a pricing model where you decide how much you want to pay for a product or service. This course is being promoted as Free, therefore no minimum price has been set meaning you can choose to pay nothing.

After finishing the course, if you feel you have got value from it, then consider paying relative to what you can afford. If you really can’t afford it then consider this our gift to you and we only ask that you pay it forward by sharing and promoting Digital Freedom to others.

Payments received will be used to meet operational costs and help get this information out to more people.


100% Privacy for YOU Policy

  • This course does not require you to create an account or provide any personal information and you will never be asked to share any personal information.
  • We do not keep logs or use any sort of tracking, you can access this course anonymously.
  • This course contains NO commercial promotions, affiliate links or sponsorships but does link to third party resources that may contain such commercial promotions.



Download a PDF copy of the Course notes


Follow the White Rabbit
Follow the White Rabbit

The following results have been automatically generated for you from the DIGITAL FREEDOM TUBE based on terms matching the major topics discussed in this part.

No posts



COMPLETED: Step 1 - Part 1


What device are you using to view this training.

Strongly disagreeDisagreeNeutralAgreeStrongly agree
Strongly disagreeDisagreeNeutralAgreeStrongly agree
Strongly disagreeDisagreeNeutralAgreeStrongly agree
Strongly disagreeDisagreeNeutralAgreeStrongly agree
Especially on anything you disagreed or strongly disagreed with
You can provide a name to be associated with this feedback.
This field is for validation purposes and should be left unchanged.